[CVE-2008-2426] imlib2 PNM and XPM buffer overflows
Bug #235915 reported by
Till Ulen
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
imlib2 (Arch Linux) |
Fix Released
|
Undecided
|
Unassigned | ||
imlib2 (Debian) |
Fix Released
|
Unknown
|
|||
imlib2 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Dapper |
Fix Released
|
Undecided
|
Unassigned | ||
Feisty |
Won't Fix
|
Undecided
|
Unassigned | ||
Gutsy |
Fix Released
|
Undecided
|
Unassigned | ||
Hardy |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
CVE-2008-2426 description:
"1) A boundary error exists within the "load()" function in
src/modules/
PNM image file. This can be exploited to cause a stack-based buffer
overflow by e.g. tricking a user into opening a specially crafted
PNM image in an application using the imlib2 library.
[...]
2) A boundary error exists within the "load()" function in
src/modules/
be exploited to cause a stack-based buffer overflow by e.g. tricking
a user into opening a specially crafted XPM image with an application
using the imlib2 library."
CVE References
Changed in imlib2: | |
status: | New → Fix Committed |
status: | Fix Committed → Fix Released |
Changed in imlib2: | |
status: | Unknown → Fix Released |
Changed in imlib2: | |
assignee: | laney → nobody |
Changed in imlib2: | |
status: | Confirmed → In Progress |
status: | Confirmed → In Progress |
status: | Confirmed → In Progress |
status: | Confirmed → In Progress |
To post a comment you must log in.
Debian advisory: www.debian. org/security/ 2008/dsa- 1594 (not yet available on the web site) lists.debian. org/debian- security- announce/ 2008/msg00175. html
http://
In the mean time, see http://